Installation Manual
Figure 8 Directory login restrictions
User LOM
Client
Workstation
Directory
Server
User restrictions must be met to
authenticate to the directory.
Enforced by the directory
server.
Role restrictions must be
met to receive rights
granted by one or more roles.
Enforced by LOM.
Role access
restrictions
User access
restrictions
12
6
39
12
6
39
12
6
39
12
6
39
User access restrictions
User address restrictions
Administrators can place network address restrictions on a directory user account. The directory
server enforces these restrictions.
For information about the enforcement of address restrictions on LDAP clients, such as a user
logging in to a LOM device, see the directory service documentation.
Network address restrictions placed on a user in a directory might not be enforced as expected
when a directory user logs in through a proxy server. When a user logs in to a LOM device as a
directory user, the LOM device attempts authentication to the directory as that user, which means
that address restrictions placed on the user account apply when the user accesses the LOM
device. When a proxy server is used, the network address of the authentication attempt is that
of the LOM device, not that of the client workstation.
IP address range restrictions
IP address range restrictions enable the administrator to specify network addresses that are
granted or denied access.
The address range is typically specified in a low-to-high range format. An address range can be
specified to grant or deny access to a single address. Addresses that fall within the low-to-high
IP address range meet the IP address restriction.
IP address and subnet mask restrictions
IP address and subnet mask restrictions enable the administrator to specify a range of addresses
that are granted or denied access.
This format is similar to an IP address range restriction, but it might be more native to your
networking environment. An IP address and subnet mask range is typically specified through a
subnet address and address bit mask that identifies addresses on the same logical network.
In binary math, if the bits of a client machine address, combined with the bits of the subnet mask,
match the subnet address in the restriction, the client meets the restriction.
DNS-based restrictions
DNS-based restrictions use the network name service to examine the logical name of the client
machine by looking up machine names assigned to the client IP addresses. DNS restrictions
require a functional name server. If the name service goes down or cannot be reached, DNS
restrictions cannot be matched and the client machine fails to meet the restriction.
Directory-enabled remote management (HPE Extended Schema configuration) 299